Forum Discussion
Question on: MFA should be enabled on accounts with owner permissions on your subscription
- Sep 04, 2019
Hello Gunter Danzeisen
you cannot exclude the account from the policy.
On the other hand, I always suggest other ways to bypass the MFA.
one way is to create a trusted location in conditional access or just add the trusted IPs at the Office 365 MFA page. Then create a rule for this account to exclude MFA on trusted locations.
An other way is to create a "back door" account, as Dr Nestori suggests : http://o365blog.com/post/aadbackdoor/
Hello Gunter Danzeisen
you cannot exclude the account from the policy.
On the other hand, I always suggest other ways to bypass the MFA.
one way is to create a trusted location in conditional access or just add the trusted IPs at the Office 365 MFA page. Then create a rule for this account to exclude MFA on trusted locations.
An other way is to create a "back door" account, as Dr Nestori suggests : http://o365blog.com/post/aadbackdoor/
- gsreejithMar 05, 2020Copper Contributor
I have a similar issue, but in my case I have enabled the third party MFA -DUO in my Azure subscription. But still it shows "MFA should be enabled on accounts with owner permissions on your subscription".
Is there any method to bypass or any settings available in the azure portal.
Thanks
Sreejith.G
- pazdedavMar 08, 2020Steel Contributor
Hi gsreejith
If your question is: "How can I tune ASC to stop showing recommendations I deem as false positive?", then there is a way how you can edit ASC security policy and turn off specific parts (e.g. MFA for owners), so you won't see related recommendations in the Compliance center anymore.